Intermediate Security Failures in DNSSEC
draft-ietf-dnssec-secfail-00

Document Type Expired Internet-Draft (dnssec WG)
Last updated 1998-08-06
Stream IETF
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html bibtex
Stream WG state WG Document
Document shepherd No shepherd assigned
IESG IESG state Expired
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-ietf-dnssec-secfail-00.txt

Abstract

This document identifies the situations where a signature verification fails in a recursive security aware DNS server, and how DNS servers should handle these cases, and the errors that should be reported to DNS resolvers. This document proposes a new error to be returned by DNSSEC capable servers. A DNSSEC server acting as a recursive server MUST validate the signatures on RRsets in a response it passes on; this draft addresses the case when the data it receives fails signature verification. The end resolver must be notified of this occurence in such a way that it will not confuse it with another error.

Authors

Ólafur Guðmundsson (ogud@ogud.com)
Brian Wellington (brian.wellington@nominum.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)